The saying, “Your Money or Your Life,” comes from the dreaded Highwaymen who were “as common as crows” between 1650 to 1800 in rural England. Travel was already hazardous due to the absence of decent roads and a lack of general rule of law. No one rode alone without fear of being robbed. In […]
Blog
Better Living through a Protocol Break
Protocol is the standard set of rules that allow all of us to communicate with each other using the proper procedure for conduct. Not that protocols do not change over time, or that they may be different by culture, but they do establish the norms for a safe and secure method for all of us […]
Ultra-Secure Mobility™: The Three Planks
The Ultra-Secure Mobility™ product has been a market need forever in demand by discerning customers that require a scalable, user friendly, and affordable product. At Cog Systems, the standard by which we measure success in this category of Ultra-Secure Mobility™ rests on three planks that fulfill a combination of the following: 1) high assurance, certified […]
Defence in Depth: How Many Layers is your Cake?
The mobile world today is largely divided into two worlds: Apple and Android. While their approach to many things may be different, they do share a common approach to security — think layer cake. Yes, the one thing that seems to matter most in making a great cake is layers. Just like your security posture. […]
Cog Q&A: Gernot Heiser, the Godfather of Modularity
For those of us in the business of devices, Gernot Heiser needs no introduction. But for the rest of you, here’s a summary: Gernot’s primary occupation is leading research in Trustworthy Systems, aiming to make software systems truly trustworthy. He also teaches Advanced Operating Systems at UNSW, which also has its own prize for the […]